{"id":47338,"date":"2014-01-29T17:01:28","date_gmt":"2014-01-29T17:01:28","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=47338"},"modified":"2014-01-31T21:41:02","modified_gmt":"2014-01-31T21:41:02","slug":"shocking-chronology-data-breaches","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/","title":{"rendered":"Shocking Chronology of Data Breaches"},"content":{"rendered":"<p><\/p>\n<h3>Shocking chronology of data breaches<\/h3>\n<p>The <a href=\"https:\/\/www.privacyrights.org\/data-breach\/new\" target=\"_blank\">Privacy Rights Clearinghouse Chronology Data Base<\/a> provides a customizable look at data breaches recorded since 2005 that continue to impact millions.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg\" alt=\"databreaches\" width=\"649\" height=\"500\" class=\"alignleft size-full wp-image-47339\" \/><\/p>\n<p><BR CLEAR=LEFT><\/p>\n<blockquote><p>stolen credit card data floods into criminal forums on a steady basis. Well north of 740 million records were exposed in 2013, making it the worst year in terms of data breaches recorded. And that&#8217;s a very conservative number derived by analyzing approximately 500 breaches listed on the <a href=\"https:\/\/www.privacyrights.org\/data-breach\/new\" target=\"_blank\">Privacy Rights Clearinghouse Chronology Data Base<\/a>, according to the Online Trust Alliance.<\/p>\n<p>That list is comprised of publicly disclosed data breaches and includes the 40 million records Target disclosed losing on Dec. 13. Target&#8217;s official estimate is now up to 110 million. And many of the breach cases listed for 2013 show an unknown or undisclosed number of records taken. So 740 million is a low number.&#8211;<br \/>\n<a href=\"http:\/\/www.usatoday.com\/story\/cybertruth\/2014\/01\/28\/cybercrooks-use-stolen-consumer-data-hour-to-hour\/4968887\/\" target=\"_blank\">USA Today 1\/28\/2014<\/a><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>A privacy rights organization is tracking the ever increasing number of data breaches.<\/p>\n","protected":false},"author":12,"featured_media":47339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4410],"class_list":["post-47338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-data-breach"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shocking Chronology of Data Breaches<\/title>\n<meta name=\"description\" content=\"Shocking Chronology of Data Breaches - A privacy rights organization is tracking the ever increasing number of data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shocking Chronology of Data Breaches\" \/>\n<meta property=\"og:description\" content=\"Shocking Chronology of Data Breaches - A privacy rights organization is tracking the ever increasing number of data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-29T17:01:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-01-31T21:41:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"749\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"Shocking Chronology of Data Breaches\",\"datePublished\":\"2014-01-29T17:01:28+00:00\",\"dateModified\":\"2014-01-31T21:41:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/\"},\"wordCount\":143,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/databreaches.jpg\",\"keywords\":[\"data breach\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/\",\"name\":\"Shocking Chronology of Data Breaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/databreaches.jpg\",\"datePublished\":\"2014-01-29T17:01:28+00:00\",\"dateModified\":\"2014-01-31T21:41:02+00:00\",\"description\":\"Shocking Chronology of Data Breaches - A privacy rights organization is tracking the ever increasing number of data breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/databreaches.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/databreaches.jpg\",\"width\":749,\"height\":596},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/shocking-chronology-data-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shocking Chronology of Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shocking Chronology of Data Breaches","description":"Shocking Chronology of Data Breaches - A privacy rights organization is tracking the ever increasing number of data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Shocking Chronology of Data Breaches","og_description":"Shocking Chronology of Data Breaches - A privacy rights organization is tracking the ever increasing number of data breaches.","og_url":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2014-01-29T17:01:28+00:00","article_modified_time":"2014-01-31T21:41:02+00:00","og_image":[{"width":749,"height":596,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg","type":"image\/jpeg"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"Shocking Chronology of Data Breaches","datePublished":"2014-01-29T17:01:28+00:00","dateModified":"2014-01-31T21:41:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/"},"wordCount":143,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg","keywords":["data breach"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/","url":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/","name":"Shocking Chronology of Data Breaches","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg","datePublished":"2014-01-29T17:01:28+00:00","dateModified":"2014-01-31T21:41:02+00:00","description":"Shocking Chronology of Data Breaches - A privacy rights organization is tracking the ever increasing number of data breaches.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/databreaches.jpg","width":749,"height":596},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/shocking-chronology-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Shocking Chronology of Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/47338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=47338"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/47338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/47339"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=47338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=47338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=47338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}